关注
David Mohaisen
David Mohaisen
其他姓名David A Mohaisen, Aziz Mohaisen
Professor of Computer Science, University of Central Florida
在 ucf.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
A Comparative Analysis of Residential and Open Proxies on the Internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
142020
A computationally-efficient construction for the matrix-based key distribution in sensor network
A Mohaisen, NS Jho, D Hong
Advances in Information Security and Assurance: Third International …, 2009
12009
A cost-effective anomaly detection system using in-dram working set of active flows table: poster
R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
12019
A data-driven study of DDoS attacks and their dynamics
A Wang, W Chang, S Chen, A Mohaisen
IEEE Transactions on Dependable and Secure Computing 17 (3), 648-661, 2018
282018
A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments
Ü Meteriz-Yıldıran, NF Yıldıran, A Awad, D Mohaisen
IEEE VR, 2022
202022
A large-scale behavioral analysis of the open DNS resolvers on the Internet
J Park, R Jang, M Mohaisen, D Mohaisen
IEEE/ACM Transactions on Networking 30 (1), 76-89, 2021
122021
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
J Park, R Jang, M Mohaisen, D Mohaisen
IEEE/ACM Transactions on Networking (TON), 2022
2022
A longitudinal analysis of. i2p leakage in the public dns infrastructure
SH Jeong, AR Kang, J Kim, HK Kim, A Mohaisen
ACM SIGCOMM Computer Communication Review, 557-558, 2016
102016
A Network-independent tool-based usable authentication system for Internet of Things devices
C Jung, J Choi, R Jang, D Mohaisen, DH Nyang
Computers & Security, 102338, 2021
52021
A one-page text entry method optimized for rectangle smartwatches
R Jang, C Jung, D Mohaisen, K Lee, D Nyang
IEEE Transactions on Mobile Computing, 2022
72022
A Privacy-preserving longevity study of Tor's hidden services
A Sanatinia, J Park, EO Blass, A Mohaisen, G Noubir
arXiv preprint arXiv:1909.03576, 2019
82019
A private walk in the clouds: Using end-to-end encryption between cloud applications in a personal domain
Y Song, H Kim, A Mohaisen
International Conference on Trust, Privacy and Security in Digital Business …, 2014
122014
A Robust Counting Sketch for Data Plane Intrusion Detection
DHN Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen
NDSS 2023, 2023
1*2023
A Scalable and Dynamic ACL System for In-Network Defense
C Jung, S Kim, R Jang, D Mohaisen, DH Nyang
ACM CCS 2022, 2022
62022
A Survey on Deep Packet Inspection for Intrusion Detection Systems
T AbuHmed, A Mohaisen, DH Nyang
Telecommunication Magazine, 2008
1302008
A user study of the effectiveness of typosquatting techniques
J Spaulding, AR Kang, S Upadhyaya, A Mohaisen
2016 IEEE Conference on Communications and Network Security (CNS), 360-361, 2016
42016
ABC: Enabling Smartphone Authentication with Built-in Camera
Z Ba, S Piao, X Fu, D Koutsonikolas, A Mohaisen, K Ren
25th ISOC Network and Distributed System Security Symposium (NDSS), 2018
422018
Access control for named domain networking
A Mohaisen, M Shirvanian, GC Murray
US Patent 11,595,398, 2023
2023
Access control for named domain networking
A Mohaisen, M Shirvanian, GC Murray
US Patent 10,887,314, 2021
2021
AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics
Ü METERIZ-YILDIRAN, NF YILDIRAN, D MOHAISEN
ACM CHI, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20